CVE-2022-40912

ETAP Lighting International NV ETAP Safety Manager 1.0.0.32 is vulnerable to Cross Site Scripting (XSS). Input passed to the GET parameter 'action' is not properly sanitized before being returned to the user. This can be exploited to execute arbitrary HTML/JS code in a user's browser session in context of an affected site.
References
Link Resource
https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:etaplighting:etap_safety_manager:1.0.0.32:*:*:*:*:*:*:*

History

30 Sep 2022, 18:20

Type Values Removed Values Added
References (MISC) https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php - (MISC) https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5711.php - Exploit, Third Party Advisory
CPE cpe:2.3:a:etaplighting:etap_safety_manager:1.0.0.32:*:*:*:*:*:*:*
CWE CWE-79
First Time Etaplighting etap Safety Manager
Etaplighting
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.1

28 Sep 2022, 14:50

Type Values Removed Values Added
New CVE

Information

Published : 2022-09-28 14:15

Updated : 2023-12-10 14:35


NVD link : CVE-2022-40912

Mitre link : CVE-2022-40912

CVE.ORG link : CVE-2022-40912


JSON object : View

Products Affected

etaplighting

  • etap_safety_manager
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')